Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
  • DIRECTORY
  • CRYPTO
    • ETHEREUM
    • BITCOIN
    • ALTCOIN
  • BLOCKCHAIN
  • EXCHANGE
  • TRADING
  • SUBMIT
Crypto Flexs
Home»HACKING NEWS»$ 7.5m kilo X hacking inside
HACKING NEWS

$ 7.5m kilo X hacking inside

By Crypto FlexsJune 15, 20253 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
$ 7.5m kilo X hacking inside
Share
Facebook Twitter LinkedIn Pinterest Email

On April 14, 2025, the KiloEX protocol suffered a loss of $ 7.5 million for significant violations of security. This event comes from the Oracle operation attack and emphasizes the important vulnerabilities of the protocol access control mechanism. Let’s find out what happened and what we can learn.

Root cause

The root of the exploit was the access control of the protocol. MinimalForwardercontract. Contract inherited from Openzeppelin ‘s MinimalForwarderUpgradeable It contains vulnerabilities executeA function that does not correctly check the signature of the data provided.

Trust model

The KiloEX protocol was operated as a complex trust model related to multiple contracts.

  • KilopriceFeed → Goalkeeper
  • Goalkeeper → Position Keeper
  • Position Keeper → Minimum forward
  • Minimum forward → Unlimited access

Critical defects are in the final link of this chain. MinimalForwarder contract I trusted the request that comes in.

Attack vector

The attacker exploited vulnerabilities by producing malicious transactions that detour intended access controls. You just need to offer the attack successfully.

  1. valid from Address (it can be obtained from previous transactions)
  2. valid signature (Also observed in the warm chain data)
  3. All arbitrary to Address (in this case Position keeper))
  4. custom data To run the function

Especially this attack MinimalForwarder The contract was not transparent and could not be found on the BSC or base.

Running attack

The attacker has been exploited through a series of calculated stages.

  1. We manipulated Oracle to lower asset prices.
  2. I opened a long position at an artificially low price.
  3. In order to raise the price, we manipulated Oracle again.
  4. Closed location for significant profits

Influence and meaning

This case reminds me of some important security principles.

  1. Access control is important Even inherited contracts require careful review and potential modifications to meet specific security requirements.
  2. Trust model verification -The complex trust relationship between contracts requires thorough verification at each stage.
  3. Oracle security -The price feed mechanism remains an important attack vector in the Defi protocol.

Evidence

The attack has been run in several chains.

Binance Smart Chain:

base:

Main takeout

  • Always review and test inherited contracts, especially access control mechanisms.
  • For security analysis, you should be able to identify and access contract implementation.
  • It is dangerous to rely on a single access control point. Implement a deep defense.

conclusion

For protocols to prevent similar events:

  1. Implement a strong signature verification in the contract delivery
  2. Keep a clear document on trust relationship between contracts
  3. Regular security audit focused on access control mechanisms
  4. Consider the implementation of the circuit breaker for significant price fluctuations.

This event shows the potential result of overlooking the importance of thorough security and the development of smart contracts.

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

Cryptocurrency Inheritance Update: March 2026

April 9, 2026

Videos and Podcasts | Vault12

April 3, 2026

Vault12 Guard 2.8 provides real-time portfolio balance for cryptocurrency inheritance

March 18, 2026
Add A Comment

Comments are closed.

Recent Posts

There is a 60% chance that the price of Ethereum will fall to $1,500, raising concerns about the market structure.

April 10, 2026

Bitcoin fails at $70K as Bears regain control.

April 10, 2026

Cryptocurrency Inheritance Update: March 2026

April 9, 2026

Enhanced Secures $1M In Strategic Pre-Seed Funding To Bring Structured Yield To More Assets Onchain

April 9, 2026

Phemex TradFi Crude Oil Trading Surges 300% As Ceasefire Volatility Sparks Record Demand

April 9, 2026

Meta is using Reels’ creator tools and AI to drive deeper into social commerce.

April 9, 2026

Crypto Airdrops -How To Spot Opportunities And Maximize Rewards

April 9, 2026

SHIB & DOGE Fetch 5%: Is a Big Triangle Breakout Coming?

April 9, 2026

Cango Inc. Announces March 2026 Operational Update; Strategically Optimizing Mining Fleet And Improving Production Economics

April 9, 2026

Wirex And Utorg Bring Seamless Crypto-to-Card Spending To 2M+ Users Worldwide

April 8, 2026

Wirex and Utorg provide seamless cryptocurrency-to-card spending for over 2 million users worldwide.

April 8, 2026

Crypto Flexs is a Professional Cryptocurrency News Platform. Here we will provide you only interesting content, which you will like very much. We’re dedicated to providing you the best of Cryptocurrency. We hope you enjoy our Cryptocurrency News as much as we enjoy offering them to you.

Contact Us : Partner(@)Cryptoflexs.com

Top Insights

There is a 60% chance that the price of Ethereum will fall to $1,500, raising concerns about the market structure.

April 10, 2026

Bitcoin fails at $70K as Bears regain control.

April 10, 2026

Cryptocurrency Inheritance Update: March 2026

April 9, 2026
Most Popular

NVIDIA Demonstrates Real-Time Generative AI in Creating 3D Desert Worlds

August 1, 2024

HKMA warns the public about fraudulent websites and phishing messages involving Mox Bank

August 24, 2024

A new framework for connecting and managing AI agent populations: Autonolas, Botto, and Numerai – The Defi Info

January 29, 2024
  • Home
  • About Us
  • Contact Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
© 2026 Crypto Flexs

Type above and press Enter to search. Press Esc to cancel.